Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Cybersecurity Takes Effort at 3 Levels

Cybersecurity Takes Effort at 3 Levels

The way people talk about cybersecurity, it’s as if it is something like a television or a new phone: something you can just buy. That’s not the truth. When you are seriously looking at how you can keep unwanted entities off your network, while having control over what you do with your technology, you need to look at it as three levels of security.

0 Comments
Continue reading

Tip of the Week: Monitor Your Hardware While Out of the Office

Tip of the Week: Monitor Your Hardware While Out of the Office

Businesses are just now starting to reopen as stay-at-home orders are lapsing or going to lapse. For many of those businesses, remote solutions have got them through this ordeal and for many others they continue to deploy a remote workforce. For companies still promoting telework, monitoring your local IT environment is something that you need a solution for. For this week’s tip, we’ll discuss some of the best practices you can use to monitor your IT while out of the office.

0 Comments
Continue reading

Tip of the Week: How to Improve Your Access Control

Tip of the Week: How to Improve Your Access Control

There is no denying that a business’ security--notably, its access control--is absolutely crucial to consider. Here, we’re offering a few tips to help you improve your business’ security through improvements to your access controls and their policies.

0 Comments
Continue reading

As IT and OT Merges, You Need to Be Prepared

As IT and OT Merges, You Need to Be Prepared

Businesses have two different types of technology to contend with each day: their information technology, and their operational technology. As these categories have become less distinct with the introduction of the Internet of Things and other similar advancements, a few new challenges to maintaining security have become apparent. Let’s go over these challenges, and what you need to do to overcome them.

0 Comments
Continue reading

New Cryptomining Malware Targets Windows Computers

crypto-12-6

Since October 2018, Microsoft engineers have been tracking a new strain of malware specifically designed to target Windows machines. As malware goes, this one isn't particularly dangerous. It's not designed to mass delete files, lock your system down or flood you with pop-up ads. Rather, its purpose is to install itself stealthily and live in the background where it will steal resources from your PC. It plans on using the resources to mine various forms of cryptocurrency on behalf of the malware's owners, giving them a fat payday and you a frustratingly slow system.

0 Comments
Continue reading

Security Issues Found In Several VNC Applications

computer-12-7

Microsoft RDP has its share of problems. That simple truth has sparked the rise of a number of open-source VNC (Virtual Network Computing) applications, which allow a user to remotely control another computer. Regardless of which VNC solution you use, they all work pretty much the same way. There's a "server component" which runs on the computer that shares its desktop.

0 Comments
Continue reading

New Ransomware Called DeathRansom Hits The Scene

ransomware-12-3

Early in 2019, a new strain of ransomware appeared. Called "DeathRansom," its bark was initially much worse than its bite. Researchers quickly discovered that the new strain only pretended to encrypt a user's files. If victims simply removed the "encryption" extension, they could get their files back without doing anything at all. That ceased to be the case around November 20th of this year.

0 Comments
Continue reading

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

zombie-12-2

Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor generations from 2011 and beyond. Intel hasn't had a good run of late, being beset almost constantly by these kinds of issues, and Zombieload was one of three new MDS variants discovered.

0 Comments
Continue reading

New Ransomware Targets Removable And Attached Drives

drive-11-29

There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. One of the most unusual features of this strain is the fact that it specifically doesn't target the C: drive of the target computer.

0 Comments
Continue reading

Some Hackers Promote Cybersecurity

Some Hackers Promote Cybersecurity

Most people have acquired much of their familiarity with what a hacker is through the mixed representation seen in pop culture today… but does this impression match up to a hacker in real life? Popular entertainment unfortunately doesn’t differentiate between different hacker types and their motivations very well, so that’s what we’ll handle here.

Understanding Hackers, Based on Motive

0 Comments
Continue reading

Racoon Stealer Malware Is New One To Watch For

raccoon-11-18

There is a new form of malware that you and your staff need to be aware of. That's because it's gaining in popularity among cyber criminals around the world. Known as 'Racoon Stealer,' it is noteworthy not for its complexity but rather, for its extreme ease of use. Worse, the malware's designers have been marketing it aggressively both inside and out of the Dark Web,

0 Comments
Continue reading

New Server Data Breach Reported at NordVPN

breach-11-5

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. It was compromised due to an insecure remote management system that was left in place by the data center provider. Worse, this was a system that NordVPN never even knew existed.

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106